Alessio Merlo

Alessio-s face is missing... :-(
Short BIO



Publications



Contacts

Short BIO

Publications

  1. A. Armando, G. Costa, A. Merlo, L. Verderame
    Securing the "Bring Your Own Device" Paradigm
    in IEEE Computer, June 2014, pp. 26-32. DOI: 0018-9162/14

  2. A. Merlo, M. Migliardi, N. Gobbo, F. Palmieri, A. Castiglione
    A Denial of Service Attack to UMTS Networks Using SIM-Less Devices
    in IEEE Transactions on Dependable and Secure Computing, Vol. 11, N. 3, 2014, pp. 280-291. DOI:10.1109/TDSC.2014.2315198.

  3. L. Caviglione, M. Coccoli, A. Merlo
    A Taxonomy-based Model of Security and Privacy in Online Social Networks
    in International Journal of Computational Science and Engineering  (IJCSE), Vol.9 No. 4, pp. 325 - 338. DOI; 10.1504/IJCSE.2014.060717, [pdf]  

  4. L. Caviglione, M. Coccoli, A. Merlo
    Social Network Engineering for Secure Web Data and Services
    DOI: 10.4018/978-1-4666-3926-3, ISBN13: 9781466639263, ISBN10: 1466639261, EISBN13: 9781466639270. Book published by IGI-Global.   [frontend

  5. M. Migliardi, A. Merlo
    Improving Energy Efficiency in Distributed Intrusion Detection Systems
    in Journal of High Speed Networks, Issue 19, pp. 251-264, IoSPress, 2013. DOI: 10.3233/JHS-130476.   [pdf

  6. G. Costa, A. Merlo, L. Verderame
    Market-based Security for Mobile Devices
    in Ercim News, No. 93, pp. 32-33, April 2013.   [pdf

  7. A. Armando, A. Merlo, M. Migliardi, L. Verderame
    Breaking and Fixing the Android Launching Flow
    in Computer & Security, Vol. 39, Issue A, November 2013, pp. 104-115, Elsevier.  DOI: 10.1016/j.cose.2013.03.009.   [pdf]  

  8. A. Armando, G. Costa, A. Merlo
    Formal Modeling and Reasoning about the Android Security Framework
    in Trustworthy Global Computing, LNCS Vol. 8191 pp. 64-81, 2013. DOI: 10.1007/978-3-642-41157-1_5.   [pdf] [slides

  9. N. Gobbo, A. Merlo, M. Migliardi
    A Denial of Service attack to GSM networks via attach procedure
    in Multidisciplinary Research and Practice for Information Systems, LNCS, Vol. 8128, Springer, pp. 361-376. DOI: 10.1007/978-3-642-40588-4_25.  [pdf] [slides

  10. A. Armando, A. Merlo, L. Verderame
    An Empirical Evaluation of the Android Security Framework
    in Security and Privacy Protection in Information Processing Systems, LNCS, Vol. 405, Springer, pp. 176-189. DOI: 10.1007/978-3-642-39218-4_14.  [pdf] [slides]

  11. L. Caviglione, M. Coccoli, A. Merlo
    A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks
    in Social Network Engineering for Secure Web Data and Services, pp. 184-205, IGI-Global Publishing, April 2013, DOI: 10.4018/978-1-4666-3926-3.ch009.  [pdf]

  12. L. Caviglione, M. Coccoli, A. Merlo
    On Social Network Engineering for Secure Web Data and Services
    in Social Network Engineering for Secure Web Data and Services, pp. 1-4, IGI-Global Publishing, April 2013, DOI: 10.4018/978-1-4666-3926-3.ch001.  [pdf]  

  13. A. Armando, A. Castiglione, G. Costa, U. Fiore, A. Merlo, L. Verderame, I. You
    Trustworthy Opportunistic Access to the Internet of Services
    in Information and Communication Technology, LNCS, Vol. 7804, 2013, Springer. pp. 469-478. DOI: 10.1007/978-3-642-36818-9_52.  [pdf] [slides

  14. A. Armando, R. Carbone, A. Merlo
    Formal Analysis of a Privacy-Preserving Billing Protocol
    in Smart Grid Security, LNCS 7823, 2013, pp. 108-119, Springer, Berlin. DOI: 10.1007/978-3-642-38030-3_8. [pdf] [slides]  

  15. M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse
    Towards Energy-Aware Intrusion Detection Systems on Mobile Devices
    in Proc. of the 8th International Conference on High Performance Computing Systems (HPCS 2013), July 1-5 2013, Helsinki (Finland), pp. 289-296. DOI: 10.1109/HPCSim.2013.6641428.  [pdf] [slides

  16. A. Armando, G. Costa, A. Merlo, L. Verderame
    Bring Your Own Device, Securely
    in Proc. of the 28th ACM Symposium on Applied Computing, Security Track (SAC 2013), Vol. 2, pp. 1852-1858, March 18-22, 2013, Coimbra, Portugal. DOI: 10.1145/2480362.2480707.  [pdf] [slides]

  17. M. Migliardi, A. Merlo
    Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches     
    in Proc. of 27th IEEE International Conference on Advanced Information Networking and Applications (AINA 2013), March 25-28 2013, Barcelona, Spain. DOI: 10.1109/WAINA.2013.214.  (Best Paper Award @ AINA 2013).   [pdf] [slides]  

  18. L. Caviglione, A. Merlo, M. Migliardi
    Green Security: Risparmio Energetico e Sicurezza
    in Mondo Digitale, nr. 44, Dicembre 2012.  [pdf]

  19. A. Armando, G. Costa, A. Merlo, L. Verderame
    Securing the "Bring Your Own Device" Policy
    in Journal of Internet Services and Information Security (JISIS), Vol. 2, N. 3, pp. 3-16, Novembre 2012. (Best Paper Award @ MIST 2012).   [pdf]  [slides]

  20. A. Merlo
    Secure Cooperative Access Control on Grid
    in Future Generation Computer Systems (FGCS), Vol. 29, I. 2, February 2013, Pages 497–508, doi: 10.1016/j.future.2012.08.001.  [pdf]  

  21. L. Caviglione, A. Merlo, M. Migliardi
    Green-Aware Security: Towards a new Research Field
    in Journal of Information Assurance and Security (JIAS), v. 7, n. 7, 2012. ISSN: 1554-1010.   [pdf]

  22. L. Caviglione, A. Merlo
    Energy Impact of Security Mechanisms in Modern Mobile Devices
    in Network Security, Vol. 2012, No. 2, pp. 11-14, Elsevier. DOI: 10.1016/S1353-4858(12)70015-6.   [pdf]

  23. A. Armando, G. Pellegrino, R. Carbone, A. Merlo, D. Balzarotti
    From Model-checking to Automated Testing of Security Protocols: Bridging the Gap
    in Tests and Proofs, LNCS Vol. 7305, 2012, pp 3-18. DOI: 10.1007/978-3-642-30473-6_3.   [pdf]  

  24. A. Armando, A. Merlo, A. Migliardi, L. Verderame 
    Would you mind forking this process? A Denial-of-Service attack on Android (and some countermeasures)       
    in Information Security and Privacy Research, LNCS IFIP AICT n.376, (Springer 2012), pp. 13-24.  DOI: 10.1007/978-3-642-30436-1_2. (Best Paper Award @ IFIP SEC 2012).   [pdf] [slides]

  25. L. Caviglione, A. Merlo
    Development of Green-Aware Security Mechanisms for Modern Internet Applications
    in Handbook of Green Information and Communication Systems, 2012, pp. 589-610, Wiley. DOI: 10.1016/B978-0-12-415844-3.00023-1.  [pdf] [slides]

  26. A. Merlo, A. Corana, V. Gianuzzi, A. Clematis
    SoRTSim: A high-level simulator for the evaluation of QoS models on Grid
    in: Remote Instrumentation for eScience and Related Aspects, F. Davoli, M. Lawenda, N. Meyer, R. Pugliese, J.  Weglartz, S. Zappatore (Eds.), (Springer, Berlin, 2012), DOI: 10.1007/978-1-4614-0508-5_11. pp. 161-176.   [pdf]

  27. P. Maresca, A. Merlo, M. Arrigoni Neri, L. Stanganelli
    Using ETC framework in virtual laboratories for online students
    in Proc. of the VII Workshop of the Italian Eclipse Community (ECLIPSE-IT 2012), 20th - 21st September 2012, Pozzuoli, Italy. ISBN: 978-88-904388-3-7.  [pdf]

  28. M. Aiello, A. Merlo, G. Papaleo
    Performance Assessment of DNS Tunneling Tools
    in Logic Journal of the IGPL, 2012, Oxford Journals, pp. 592-602. DOI: 10.1093/jig- pal/jzs029.   [pdf]

  29. A. Merlo
    A Cooperative Model for Resource Sharing on Grid
    in Journal of Information Assurance and Security (JIAS), Volume 6, Issue 1, pp. 106-114, Dynamic Publishers Inc., USA. ISSN: 1554-1010.   [pdf]

  30. A. Merlo, G. Papaleo, S. Veneziano, M. Aiello
    A Comparative Performance Evaluation of DNS Tunneling Tools
    in Computational Intelligence in Security for Information Systems, LNCS Vol. 6694, 2011, pp. 84-91. DOI: 10.1007/978-3-642-21323-6_11.   [pdf]

  31. A. Merlo, D. D’Agostino, V. Gianuzzi, A. Clematis, A. Corana
    GridWalker: a visual tool for supporting the advanced discovery of Grid resources
    in: Remote Instrumentation Services in the e-infrastructure, F. Davoli, N. Meyer, R. Pugliese, S. Zappatore (Eds.), (Springer, Berlin, 2011) ISBN 978-1-4419-5573-9, pp. 103-112. DOI: 10.1007/978-1-4419-5574-6_8.  [pdf]

  32. L. Caviglione, A. Merlo, M. Migliardi
    What is Green Security?
    in Proc. of the 7th International Conference on Information Assurance and Security (IEEE IAS-2011), Malacca (Malaysia), pp. 366-371. DOI: 10.1109/ISIAS.2011.6122781.  [pdf]

  33. P. Gasti, A. Merlo
    On Re-Use of Randomness in Broadcast Encryption
    in Proc. of the 9th IEEE International Conference on Privacy, Security and Trust (PST 2011), Canada, pp. 36-43. DOI: 10.1109/PST.2011.5971961.   [pdf]

  34. M. Migliardi, A. Merlo
    Modeling the energy consumption of an IDS: a step towards Green Security
    in Proc. of the 34th IEEE International Convention on Information and Communication Technology, Electronics and Microelectronics - Information Systems Security (ISS-MiPRO’11), pp. 1452 - 1457.  ISBN: 978-1-4577-0996-8. [pdf]

  35. A. Merlo, A. Clematis, A. Corana, V. Gianuzzi
    Quality of Service on Grid: architectural and methodological issues
    in Concurrency and Computation: Practice and Experience, Wiley, 2010, DOI: 10.1002/cpe.1641, pp. 745-766.   [pdf]

  36. A. Merlo, A. Clematis, A. Corana, D. D’Agostino, V. Gi- anuzzi, A. Quarati
    SoRTGrid: a Grid framework compliant with Soft Real Time requirements
    in Remote Instrumentation and Virtual Laboratories: Service Architecture and Networking, F. Davoli, N. Meyer, R. Pugliese, S. Zappatore (Eds.), (Springer, Berlin, 2010) ISBN 978-1-4419-5595-1, pp. 145-161. DOI: 10.1007/978-1-4419-5597-5_13.   [pdf]

  37. V. Gianuzzi, A. Merlo
    Beaconing support in Publish-Subscribe Middleware for Vehicular Applications
    in Proc. of the 2nd International Workshop on Pervasive Mobile and Embedded Computing (ACM M-MPAC 2010) India, ISBN: 978-1-4503-0451-1, pp. 1-8. DOI: 10.1145/1890791.1890795.  [pdf]

  38. A. Merlo, A. Armando
    Cooperative Access Control for the Grid
    in Proc. of the 6th International Conference on Information Assurance and Security (IEEE IAS 2010), USA, ISBN: 978- 1-4244-7407-3, pp. 228-233. DOI: 10.1109/ISIAS.2010.5604068.   [pdf]

  39. P. Gasti, A. Merlo, G. Ciaccio, G. Chiola
    On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks
    in Proc. of the 9th IEEE International Symposium on Network Computing and Applications (IEEE NCA 2010), USA, ISBN: 978-0-7695-4118-1, pp.192-197. DOI: 10.1109/NCA.2010.34.   [pdf]

  40. V. Gianuzzi, D. D’Agostino, A. Merlo, A. Clematis
    Efficient management of resources and entities using the HyVonNe P2P architecture
    in International Journal of Grid and Utility Computing (IJGUC), Special Issue on Efficient Techniques for Resource and Service Management in Grid and P2P-based Applications, v. 1, n. 3, 2009, pp. 216-226. DOI: 10.1504/IJGUC.2009.027649.   [pdf]

  41. A. Merlo
    Unconditional Security of a Quantum-key Storage Device
    in Proc. of the 3rd Italian Workshop on PRIvacy and SEcurity (PRISE 2008), Roma, Universita' La Sapienza, 20 Ottobre 2008, Tech. Rep. 14/2008 Dip.to Informatica, Univ. La Sapienza, pp. 25-29.   [pdf]

  42. A. Merlo, M. Aiello, G. Papaleo, D. Chiarella
    Improvements in physical intrusion detection on LAN
    in Proc. of the 3rd Italian Workshop on PRIvacy and SEcurity (PRISE 2008), Roma, Universita' La Sapienza, 20 Ottobre 2008, Tech. Rep. 14/2008 Dip.to Informatica, Univ. La Sapienza, pp. 30-34.   [pdf]

  43. A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo
    Grid services for 3D data analysis in Virtual Laboratories
    in ’Grid Enabled Remote Instrumentation’, Series: Signals and Communication Technology, F. Davoli, N. Meyer, R. Pugliese, S. Zappatore (Eds.), Springer, Berlin, 2008, ISBN 978-0-387-09662-9, pp. 481-498. DOI: 10.1007/978-0-387-09663-6_32.   [pdf]

  44. A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo, A. Quarati
    A Distributed Approach for Structured Resource Discovery on Grid
    in Proc. of the 2nd Int. Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2008), Barcelona, (IEEE Computer Society, 2008) ISBN 0-7695-3109-1, pp. 117-125. DOI: 10.1109/CISIS.2008.112.   [pdf]

  45. V. Gianuzzi, A. Merlo, A. Clematis, D. D’Agostino
    Managing Networks of Mobile Entities using the HyVonNe P2P Architecture
    in Proc. 2nd Int. Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2008, Barcelona, Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC), IEEE Computer Society, 2008), ISBN 0-7695-3109-1, pp. 335-341. DOI: 10.1109/CISIS.2008.62.   [pdf]

  46. A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo.
    Grid services for 3D data analysis in Virtual Laboratories
    in Grid Enabled Remote Instrumentation, Series: Signals and Communication Technology, F. Davoli, N. Meyer, R. Pugliese, S. Zappatore (Eds.), Springer, Berlin, 2008, ISBN: 978-0-387-09662-9, pp. 481-498. DOI: 10.1007/978-0-387-09663-6_32.   [pdf]

  47. A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo
    Resource selection and application execution in a Grid: A migration experience from GT2 to GT4
    in LNCS n. 4276, ’On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA and ODBASE’, R. Meersmann, Z. Tari et al. (Eds.), Springer, Berlin, 2006, ISBN: 978-3-540-48274-1, pp. 1132-1142. DOI: 10.1007/11914952_4.   [pdf]

Contacts

Email:
unigemail
Phone:
+39 010 353 2344
Fax:
+39 010 353 2948
My PGP key is...
 here.
You can find me here:
Villa Bonino, 3rd floor,
Viale F. Causa, 13
16145, Genova, Italy.